Criminal record-management-system REPORT

6,508 views

Published on

Criminal record-management-system REPORT

Published in: Education

Criminal record-management-system REPORT

  1. 1. SUBMITTED BY : MARIYAMTARIQ 2123 SHAHRUKH SHAKEEL 2077 ZOHAIB ALI 2147 REPORT ON CRIMINAL RECORD MANAGEMENT SYSTEM
  2. 2. DEDICATION This project is specially dedicated to the our force sindh police and their sacrifices for attaining the peace in the city with limited resources. This project will help them to maintaining the record of criminals efficiently and it will helpful for the police or rangers to check the record of the criminals in just some seconds and it would easily update , delete , edit the record of criminal with the help of the crms.
  3. 3. ACKNOWLEDGEMENT First of all thanks to sir hassan Zaidi for giving this such a wonderful opportunity to make this project and give us chance to give awareness to people about criminal record management system. he guide us on every step in making of this project about erd , usecase etc everything which was the need of this project .this faculty member makes us learn about the project and the software. engineering course throughout the semester. The success of the project was impossible without this faculty member. we are specially thanks to sir hassan Zaidi for helping us in every aspect of this project .
  4. 4. PREFACE The need for good record-keeping and information- sharing practices has taken on added significance in today’s global environment. Not only do good records provide crucial internal information (i.e., business operations and case management support—not to mention the official memory of an agency’s investigations), law enforcement agencies now need to communicate agency-to-agency and across continents in order to protect the Nation’s citizens. Nothing is more important to accomplishing that mission than having accessibility to accurate and timely records. Calls for service records and investigative, arrest, criminal identification, detention, and even civil records hold information that by themselves mean little; however, when pieced together with information from other jurisdictions, the result can help with all levels of investigations and aid in safeguarding the Nation.
  5. 5. TABLE OF CONTENTS Contents: BACKGROUND:...................................................................................................................................7 OBJECTIVES :......................................................................................................................................7 INTRODUCTION:.................................................................................................................................7 SCOPE OF THE PROJECT: .....................................................................................................................9 SYSTEMINTERFACES.........................................................................................................................10 USER INTERFACES.............................................................................................................................10 HARDWARE INTERFACE:....................................................................................................................10 SOFTWARE INTERFACES:...................................................................................................................10 MEMORY CONSTRAINTS:..................................................................................................................11 OPERATIONS:...................................................................................................................................11 PRODUCT FUNCTIONS:......................................................................................................................11 FUNCTIONL REQUIREMENTS: ............................................................................................................11 NON- FUNCTIONAL REQUIREMENTS: .................................................................................................12 USE CASE DIAGRAM:.........................................................................................................................14 OVERVIEW OF THE SYSTEM:..............................................................................................................16 PRODUCT FUNCTIONALITIES: ............................................................................................................16 DATA FLOW DIAGRAM:.....................................................................................................................16 LEVEL...............................................................................................................................................16 LEVEL 1 DFD / LEVEL 2 DFD:.............................................................................................................17 LEVEL 3 DFD: ....................................................................................................................................18 LEVEL 4 DFD: ....................................................................................................................................19 ENTITY RELATIONSHIP DIAGRAM(ERD):.............................................................................................20 ERD..................................................................................................................................................20 DATABASE DESIGN:.................................................................................Error! Bookmark not defined. PROJECT BENEFITS:...........................................................................................................................26 FUTURE ENHANCEMENT:..................................................................................................................26 CONCLUSION:...................................................................................................................................27
  6. 6. CHAPTER 1
  7. 7. BACKGROUND: The project is aimed to develop a crime file for maintain a computerized records of all the fir against crime. The system is desktop application that can be access throughout the police department. This systemcan be used as an application for the crime file of the police department to manage the records of different activity of related to first information report .In such desktop Crime file system we will manage all such activities (like registration of the complaint updating information, search of particular viewing of the respective reports of crimes) that will save time, manpower. This systemwill provide better prospective for the enhancement of organization regarding to quality and transparency. OBJECTIVES : The objectives of this systemcan broadly be listed as follows:  Make the Police functioning citizen friendly and more transparent by automating the functioning of Police Departments.  Improve delivery of citizen-centric services through effective usage of ICT.  Provide the Investigating Officers of the Civil Police with tools, technology and information to facilitate investigation of crime and detection of criminals.  Improve Police functioning in various other areas such as Law and Order, Traffic Management etc.  Facilitate Interaction and sharing of Information among Police Departments, Districts, State/ headquarters and other Police Agencies.  Assist senior Police Officers in better management of Police Force  Keep track of the progress of Cases, including in Courts  Reduce manual and redundant Records keeping INTRODUCTION: Crime File System is a system used to report crimes. This project is mainly useful for police Departments. This system will help to manage all the activities in a police Department using computers. Currently all the works are done manually, by computerizing all the activities inside a police Department can be managed easily and effectively. The police Departments in the country are, today, virtually unconnected islands. Thanks to telephones and wireless, and especially thanks to mobile telephones, there is voice connectivity between the policeDepartment and senior police officers,but that is about all.There is no system of data storage, data sharing and accessing data. There is no system under which one police Department can talk to another directly. There is no record of crimes or criminals that can be accessed by a Department House Officer, except the manual records relating to that police Department. The goals of the system are to facilitate collection, storage, retrieval, analysis, transfer and sharing of data and information at the police Department and between the police Department and the State Headquarters and the Central Police Organizations.
  8. 8. CHAPTER 2
  9. 9. SCOPE OF THE PROJECT: The system ‘CRIME FILE’ will be a Reporting application that will be used for automating the manual process of register different case in police Department .This system will manage the details of all the crime who register themselves in police Department. The system provides an interface to store the crime details of criminals or prisoners and allows the user to search and view records. The systemshould have a login. System should support for Data Entry module for Nominal Roll, Case register for each prisoner entering in the prison The system will greatly simplify the overall procedure of crime files. The proposed system includes the following features:  Login for user and admin  Complaint registration  View complaint status  Criminal register management  FIR Management  Case History Details management  Managing Postmortem details  Prisoners register management.  Manage list about most wanted criminals At itscore,the systemshouldofferthe followingbasicfunctionalities: .  The system requests that the administrator to enter his/her name, password.  The administrator enters his/her name, password.  The system validates the entered name, password, logs the actor into the system.  The administratormaintainsthe recordof informationof variousfir,crimesandrelated objects.  If in the basic flow, the actor enters an invalid name, password, the system displays an error message. The actor can return to the beginning of the basic flow.
  10. 10. SYSTEM INTERFACES None USER INTERFACES  There will be a screen to display varios information related to FIR.  A login screen for entering username, password will be provided.  There will be a screen for taking and modifying the information of the related to FIR.  Windows based  Friendly Navigation HARDWARE INTERFACE:  Keyboard  Mouse  Screen resolution of at least 1024x768- required for proper and complete viewing of screens. SOFTWARE INTERFACES:  Any Windows based operating system (Microsoft Windows XP or higher).  MS Access as the DBMS-for database. Front End Client Application(withdata Entry/ update/cancel/view Andreportingfacility) Backend Database
  11. 11. MEMORY CONSTRAINTS:  At least64 MB RAM and 2 GB space on hard diskwill be requiredforrunningthe application OPERATIONS:  Viewing  Addition( by administrator only)  Updation( by administrator only)  Deletion ( by administrator only) PRODUCT FUNCTIONS:  Accepting crimes information correctly.  Storing the correct records in the database.  Displaying correct information on selecting view option.  Displaying current status of fir of the all crimes.  Accepting the updated information from user and administrator.  Storing the updated record in database to make it consistent.  Deletion privilege to administrator only. FUNCTIONL REQUIREMENTS: Requirement no 1: Register for the Criminal or prisoner  Input : criminals personal details via – Criminal No., Criminal Name, Age, Occupation, Crime Type, address, most wanted.  Prisoner details : Prisoner No., Charge Sheet No., Nickname, Crime Type, Family Member Identity Mark, Height, Weight, Color.  Processing : validation checks are performed on the input data by the user/administrator like 1. mandatory fields should not be kept blank 2. prisoner family member should be check 3. All the entries in database should be correct
  12. 12. Requirement no 2: FIR management  Input : Fir no, COMPLAINT NO., Fir Date, Fir Time , Information Type, Place of crime, Act for crime, District of FIR, Address of victim, Passport No, Name of Police, Received Time, Information Received  Processing: After inputting data validation checks on various fields is performed. On submission of the information the record is searched in the stored database o basis of the information submitted.  Output: If the information submitted by the user is valid and found in the database then the corresponding record is displayed. Requirement No 3: Add or Updation of user or administrator  Input: Username, password.  Processing : After entering the required information the various validation checks are performed on submission of the information, the Updation are made to the database. 1. Administrator must enter the correct user name and password.  Output : The updated information is reflected in the stored database Requirement No 4: Viewing  Input: none.  Processing: on clicking the view button the system search for the specified database stored.  Output: if the specified database is stored then the whole database is display in the tabular form. The data displayed is the updated and current information of the user personal and academic details. It also displays the status of the prisoner and criminals. NON- FUNCTIONAL REQUIREMENTS:  Secure access of confidential data (user’s details). SSL can be used.  24 X 7 availability  Better component design to get better performance at peak time.  Flexible service based architecture will be highly desirable for future extension.
  13. 13. USE CASE DIAGRAM: Administrator User Login/Logoff Add/delete user Addcomplaintstatus Searchcriminal/prisoner Registration Criminal/Prionser/Postmortem/ Most wanted Login/logoff SearchCriminal/Prisoners View ComplaintStatus View Reports FIR/postmortem/mostwanted View Registrationfor FIR/Charge Sheet Case History Registration Criminal/Prisoner/Postmortem/ Exit
  14. 14. CHAPTER 3
  15. 15. OVERVIEW OF THE SYSTEM: CRIME FILE is a system which aims at making the store records of crimes easier. This system provides an easy way to admin to keep track of record of all the crimes and saves him loads of manual work. This systemmakes updation of records easierby both user and admin and provides updated information about the current crimes status in happening. PRODUCT FUNCTIONALITIES:  Accepting crimes information correctly.  Storing the correct records in the database.  Displaying correct information on selecting view option.  Displaying current status of fir of the all crimes.  Accepting the updated information from user and administrator.  Storing the updated record in database to make it consistent.  Deletion privilege to administrator only. DATA FLOW DIAGRAM: The data flow diagram enables the software engineer to develop models of the information domain and functional domain at the same time. As the DFD is defined into greater level of details, the analyst performs as implicit functional decomposition of the system, thereby accomplishing the fourth operational analysis principle for functions. At the same time, the DFD refinement results in a corresponding refinement of data as it moves through the processes that embody the application. LEVEL 0 DFD:
  16. 16. LEVEL 1 DFD / LEVEL 2 DFD:
  17. 17. LEVEL 3 DFD:
  18. 18. LEVEL 4 DFD:
  19. 19. ENTITY RELATIONSHIP DIAGRAM (ERD):
  20. 20. DATABASE MODULE: For creation of database Microsoft Access a popular relational database management systemis used. The database is connected visual basic which have inbuilt functions to connect to database, enter information to database and extract data. The project database has following tables. Login –admin login Login –user login Criminal registration
  21. 21. Prisoner registration Postmortem Most wanted
  22. 22. FIR Charge sheet
  23. 23. Complaint status Complaint registration
  24. 24. CHAPTER 4
  25. 25. PROJECT BENEFITS:  CRMS initiates the objective of providing the user with customized and powerful complaint registration and process management system side software.  This system will provide better prospective for the enhancement of organization regarding to quality and transparency.  Ensure data accuracy‘s.  Reduce the damages of the machines.  Minimize manual data entry.  Greater efficiency.  Better service.  User friendliness and interactive  Minimum time required. FUTURE ENHANCEMENT:  We can update this system as online application  The main advantage of online application is that, a person can report the crime anytime from anywhere.  Users can view the progress of their complaint online.  By the future technology user can view the case details and progress of the complaints on their mobile phones  Face recognition technology can apply. User or witness of the crime can give the physical information of the thief.
  26. 26. CONCLUSION: CRIMENAL RECOR MANAGEMENT SYSTEM initiates the objective of providing the user with customized and powerful complaint registration and process management system side software. The software is built with all options such as complaint registration, prisoner’s registration, and postmortem report generation etc…All the requirements specified during the analysis and design phase are fully met, thus resulting in the formation of good software. The interface provided is very user friendly and flexible for all times.
  27. 27. 77

×